Browse Definitions:
  • December 31, 2015 31 Dec'15

    Industrial Internet Consortium (IIC)

    The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.  Continue Reading

  • December 30, 2015 30 Dec'15

    GNU project

    The GNU project is a mass collaborative initiative for the development of free software. Richard Stallman founded the project in 1978 at MIT.  Continue Reading

  • December 28, 2015 28 Dec'15

    slacktivism

    Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.  Continue Reading

  • December 28, 2015 28 Dec'15

    dynamic voltage and frequency scaling (DVFS)

    Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device’s various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power-saving when ...  Continue Reading

  • December 27, 2015 27 Dec'15

    consumerism

    Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.  Continue Reading

  • December 25, 2015 25 Dec'15

    Twitter

    Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.  Continue Reading

  • December 24, 2015 24 Dec'15

    LoRa Alliance

    The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).  Continue Reading

  • December 22, 2015 22 Dec'15

    Jargon File (New Hacker's Dictionary)

    The Jargon File is a compilation of computer-related slang that was first developed in 1975 by Raphael Finkel at Stanford University from sources including the Stanford and MIT AI Labs, Carnegie Mellon University and Worcester Polytechnic Institute.  Continue Reading

  • December 21, 2015 21 Dec'15

    cyberbullying

    Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.  Continue Reading

  • December 18, 2015 18 Dec'15

    widget

    In general, widget (pronounced WID-jit) is a term used to refer to any discrete object, usually of some mechanical nature and relatively small size, when it doesn't have a name, when you can't remember the name, or when you're talking about a class ...  Continue Reading

  • December 18, 2015 18 Dec'15

    beta test

    In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.  Continue Reading

  • December 18, 2015 18 Dec'15

    Google Docs

    Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.  Continue Reading

  • December 15, 2015 15 Dec'15

    digital wallet security

    Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.  Continue Reading

  • December 15, 2015 15 Dec'15

    stingray (IMSI catcher)

    A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator. Stingray is sold to governmental and law enforcement sectors.  Continue Reading

  • December 15, 2015 15 Dec'15

    cryptocurrency

    A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.  Continue Reading

  • December 15, 2015 15 Dec'15

    circular economy

    A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.  Continue Reading

  • December 11, 2015 11 Dec'15

    collaborative consumption

    Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.  Continue Reading

  • December 11, 2015 11 Dec'15

    going dark

    Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel.  Continue Reading

  • December 10, 2015 10 Dec'15

    limited liability company (LLC)

    A limited liability company (LLC) is a hybrid unincorporated business structure that combines the pass-through tax model of partnerships and sole proprietorships with the protection of individual assets provided by the C corporation.  Continue Reading

  • December 10, 2015 10 Dec'15

    cooperative (co-op)

    A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members. A cooperative is formed when several people identify an unmet need.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

SearchSolidStateStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close